00:20:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

CompTIA Security+ SY0-701 (V7) Logo
  • Free CompTIA Security+ SY0-701 (V7) Practice Test

  • 20 Questions
  • Unlimited
  • General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 20

During a period of international expansion, a company must revise its security governance documentation to ensure ongoing compliance with various regional laws and adherence to best practices. Which type of governance document is most critical to update and maintain to address these requirements?

  • Policies for the Use of Technology Resources

  • Disaster Recovery Plans

  • Business Continuity Documentation

  • Information Security Policies

Question 2 of 20

A healthcare organization relies on a third-party service provider to manage its electronic health records (EHR) system. Recently, the service provider experienced a security breach, potentially exposing sensitive patient information. What type of vulnerability does this scenario best illustrate?

  • Zero-day

  • Supply Chain

  • Misconfiguration

  • Insider Threat

Question 3 of 20

A system administrator is about to perform a major software upgrade on a critical virtual server. The administrator needs a way to quickly revert the server to its exact pre-upgrade state if any issues arise. Which of the following backup methods would be the MOST efficient for this purpose?

  • Run a differential backup job.

  • Perform a full backup to tape.

  • Take a snapshot of the virtual server.

  • Enable replication to a warm site.

Question 4 of 20

Which of the following statements BEST explains why a network firewall alone cannot provide the same level of protection as encryption for data stored on a network file server?

  • A firewall enforces access rules for network traffic, but only encryption renders the stored data unreadable to unauthorized users, so both controls are required to protect data at rest.

  • Neither firewalls nor encryption protect data at rest; only physical security controls such as locks and guards can do so.

  • A properly configured firewall automatically encrypts any files transmitted or stored behind it, eliminating the need for separate data-at-rest encryption.

  • Encryption secures data moving across the network, whereas a firewall secures all data that resides on the server's drives.

Question 5 of 20

In a highly secure network environment with strict throughput requirements, which device attribute would MOST likely be preferred when implementing a security control intended to scrutinize traffic without causing significant latency?

  • An active security device configured to make real-time decisions

  • A tap/monitor setup that passively observes traffic

  • A security device configured to fail-open to reduce latency

  • An inline security device configured to interact with traffic

Question 6 of 20

Your company’s network is configured to always check authentication/authorization each time a user tries to access data. The company is using which security model?

  • Extranet

  • Intranet

  • Zero trust

  • VLAN

Question 7 of 20

A financial services company is updating its business continuity plan. For its critical online transaction processing system, the management team has determined that the system can be unavailable for a maximum of one hour before causing unacceptable business disruption and financial loss. Which business continuity metric does this one-hour time limit represent?

  • Recovery Point Objective (RPO)

  • Recovery Time Objective (RTO)

  • Mean Time to Detect (MTTD)

  • Mean Time to Repair (MTTR)

Question 8 of 20

A security architect is creating a resilience plan for a new hybrid cloud deployment. The architect has noted that ensuring patch availability from all third-party vendors is a critical consideration. What is the primary security-related justification for this emphasis on patch availability?

  • To enhance the graphical user interface

  • To ensure compatibility with legacy systems

  • To increase the system's processing speed

  • To fix security vulnerabilities and bugs

Question 9 of 20

A company is upgrading its authentication system by adding a biometric factor to its existing password policy. The security team's primary concern is preventing authentication bypass using simple spoofing methods, such as high-resolution photographs or voice recordings. Which of the following solutions BEST addresses this specific concern while being a widely adopted and mature technology?

  • Installing key fob devices

  • Implementing fingerprint scanning

  • Using facial recognition technology

  • Setting up voice recognition systems

Question 10 of 20

A security analyst is reviewing the company's disaster recovery plan (DRP). The analyst notes that the DRP focuses heavily on restoring critical business functions but lacks a comprehensive inventory of IT hardware, software, and data assets. Which of the following BEST describes the risk associated with this omission?

  • Recovery will be faster as teams can focus on broad functions rather than being slowed down by the details of specific assets.

  • Recovery efforts may be delayed and incomplete because there is no detailed inventory to guide prioritization and restoration.

  • The DRP's effectiveness is not impacted, as the primary goal of restoring business functions makes a specific asset inventory redundant.

  • The lack of an inventory primarily represents a financial risk for insurance claims but does not affect the technical recovery process.

Question 11 of 20

Which identity and access management solution creates a single point of failure whereby compromising one set of user credentials could let an attacker access every connected application the user is authorized for?

  • Single sign-on (SSO) service

  • Network segmentation using VLANs

  • IPSec virtual private network (VPN) tunnel

  • Discretionary access control (DAC) model

Question 12 of 20

A coworker identified a vulnerability in a third-party software solution hosted on-premises. The coworker is out sick and has asked you to remediate this issue as quickly as possible. You have found an official patch from the vendor's website. What is the NEXT procedural step you should take?

  • Submit a change request according to the company's change management process.

  • Install the patch immediately and inform affected users.

  • Begin monitoring for related incidents.

  • Start the incident response process.

Question 13 of 20

An organization is assembling its enterprise risk register. Which of the following elements should be documented for each listed risk so the team receives an early warning when the likelihood or impact of that risk begins to increase?

  • Key Performance Indicator (KPI)

  • Key Risk Indicator (KRI)

  • Service-Level Agreement (SLA)

  • Memorandum of Understanding (MOU)

Question 14 of 20

A company is revising its network security strategy to align with a Zero Trust model. Which of the following principles should be the foundational guideline for the company's revised approach to network security?

  • Encrypt all data at rest

  • Restrict user privileges based on roles

  • Never trust, always verify

  • Implement implicit trust zones within the network

Question 15 of 20

A company is revising its security monitoring strategies to enhance incident detection and response. Their current system is primarily manual, resulting in delayed identification and inconsistent reporting of suspicious activities. Which of the following is the BEST method to improve their incident reporting and monitoring process?

  • Expanding the in-house security team

  • Increasing the frequency of manual security audits

  • Implementing real-time automated monitoring and alerting systems

  • Conducting more comprehensive employee training sessions

Question 16 of 20

Encapsulating data within a secure tunneling protocol negates the need for encrypting the payload itself since encapsulation provides sufficient security measures.

  • True

  • False

Question 17 of 20

Which of the following is most effective in preventing an attacker from easily guessing or cracking a password?

  • Avoiding the use of special characters in the password

  • Increasing the number of characters in the password

  • Using a password without any numeric characters

  • Setting the password expiration to 90 days

Question 18 of 20

A company has implemented a centralized proxy to manage web traffic. Which of the following tasks would MOST effectively utilize the proxy to enhance the organization's security posture?

  • Inspecting and logging web traffic for analysis and compliance.

  • Configuring automatic backups of user data every 24 hours.

  • Allowing users to tunnel web traffic through SSH to enhance encryption.

  • Restricting all users' access to the control panel on their respective machines.

Question 19 of 20

An organization's server room entry is secured solely by numerical access codes, which has recently led to heightened concerns about the method's vulnerability to systematic guessing attempts. To increase the difficulty for perpetrators attempting to gain unauthorized entry, which enhancement should be taken?

  • Installing a biometric authentication system.

  • Enhancing video surveillance around the entry area.

  • Intermittent updates to numerical access codes.

  • Setting up an audible alert after multiple failed entry attempts.

Question 20 of 20

Which of the following techniques involves replacing sensitive data with unique identification symbols that retain all the essential information about the data without compromising its security?

  • Tokenization

  • Encryption

  • Salting

  • Anonymization